Sciweavers

177 search results - page 27 / 36
» Access Control Based on Execution History
Sort
View
SUTC
2010
IEEE
13 years 11 months ago
Pushing the Throughput Limit of Low-Complexity Wireless Embedded Sensing Systems
—To maximize the communication throughput for wireless sensing systems, designers have attempted various combinations of protocol design and manual code optimization. Although th...
Vahid Salmani, Pai H. Chou
ICDIM
2007
IEEE
13 years 11 months ago
Exploiting contextual handover information for versatile services in NGN environments
Users in ubiquitous and pervasive computing environments will be much more empowered in ways to access and to control their navigation. Handover, the vital event in which a user c...
Edson dos Santos Moreira, David N. Cottingham, Jon...
JMM2
2007
113views more  JMM2 2007»
13 years 7 months ago
Signalling Cases and QoS Management within TISPAN NGN Residential Environments
Abstract— The TISPAN group from ETSI is currently working on the specification a Next Generation Network (NGN), based on the IP Multimedia Subsystem (IMS) as the service control...
Iván Vidal, Francisco Valera, Jaime Garc&ia...
ISW
2010
Springer
13 years 5 months ago
Privilege Escalation Attacks on Android
Abstract. Android is a modern and popular software platform for smartphones. Among its predominant features is an advanced security model which is based on application-oriented man...
Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeg...
CSFW
2004
IEEE
13 years 11 months ago
The Consistency of Task-Based Authorization Constraints in Workflow Systems
Workflow management systems (WFMSs) have attracted a lot of interest both in academia and the business community. A workflow consists of a collection of tasks that are organized t...
Kaijun Tan, Jason Crampton, Carl A. Gunter